Forwarding DMZ firewall Logs to VRLI
Scope and Purpose of the Blog
The documents describes the detailed steps involved in conducting POC for configuring VRLI to be Syslog server for any physical device here for DMZ Firewalls , by leveraging DMZ Firewalls option to forward the predefined logs to a syslog server in their settings. So ,if it got successful , vRLI will capture the logs and save it in form of events in its database. So in future if we want to export those logs from vRLI, it will be in form of CSV format .
Assumptions and Constraints
Following are the assumptions made while creating this document :
One test device is available on which settings have to be made for this POC .
vRLI cluster is working fine .
Further action plan , will be decided on the basis of POC results .
Procedure
Configuring VRLI server as Syslog Server in Test Device :
Open the Syslog settings on device “TEST Machine ”and below dialog box will open .
Here , enable syslog server .
Enter vRLI FQDN or IP in syslog settings of firewall device with Syslog server port as 514 .
By this setting , we are configuring vRLI as syslog server for this device .
Checking on vRLI side -
We have configured vRealize Log Insight to collect logs forwarded by DMZ Firewalls . Now , perform the following steps on VRLI :
Login to VRLI FQDN using admin credentials.
Click Interactive login on the vRLI dashboard .
Choose "source" as IP of DMZ Firewalls server IP and hit enter .
Observe for 24 hours and then check again .
Result of POC -
Possibility 1 - No logs of DMZ Firewalls TEST device is received at vRLI after 24-48 hours of POC configuration . Then , it states , we cannot use vRLI as syslog server for DMZ Firewalls due to below reasons :
We have already checked in MarketPlace, there is no content pack for DMZ Firewalls.
Content pack act as a mediator between Third Party Application and vRLI, when we want to deeply analyse the logs and present in forms of Dashboards and other vRLI features ; which is absent for DMZ Firewalls .
vRLI agent are only for Windows and Linux operating system and as DMZ Firewalls are using Native OS ; so this is not possible with the help of agent as well .
Possibility 2 - Logs of DMZ Firewalls TEST device are received at vRLI after 24-48 hours of POC configuration .Then we are successfully , leveraging DMZ Firewalls option to forward the predefined logs to a syslog server in their settings. So , by this way , vRLI captures the logs and save it in form of events in its database. So in future if we want to export those logs from vRLI, it will be in form of CSV format .
Result of our POC -
Logs of DMZ Firewalls TEST device are received at vRLI after 24-48 hours of POC configuration .Then we are successfully , leveraging DMZ Firewalls option to forward the predefined logs to a syslog server in their settings. So , by this way , vRLI captures the logs and save it in form of events in its database. So in future if we want to export those logs from vRLI, it will be in form of CSV format .

Comments
Post a Comment